Published Fast: - If it's accepted, We aim to get your article published online in 48 hours.

Home / Articles

No Article found
QUANTUM CRYPTOGRAPHY IN ZERO TRUST NETWORKS: AN ENHANCED SECURITY FRAMEWORK
Author Name

Dr.B. Anuja Beatrice, Karthikeyan. BK, Saravanakumar. N

Abstract

The rapid advancements in quantum computing present significant risks to conventional cryptographic standards such as RSA (Rivest-Shamir-Adleman), ECC (Elliptic Curve Cryptography), and DSA (Digital Signature Algorithm). These encryption systems are foundational to modern cybersecurity and rely on the computational difficulty of mathematical problems like integer factorization and discrete logarithms. However, quantum algorithms, particularly Shor's algorithm, can efficiently solve these problems, rendering traditional cryptographic methods vulnerable to quantum attacks. This growing threat underscores the urgent need for robust security frameworks capable of mitigating post-quantum security risks.

 

In response to these challenges, this paper introduces a comprehensive security framework that integrates Quantum Key Distribution (QKD) with Zero-Trust Architecture (ZTA) to enhance resilience against post-quantum threats. QKD leverages the principles of quantum mechanics to enable secure key exchange, ensuring that any eavesdropping attempts are detectable due to quantum state disturbances. Meanwhile, ZTA operates on the principle of "never trust, always verify," enforcing strict access controls and continuous authentication to minimize the risk of unauthorized access within enterprise environments.

Our proposed framework optimizes QKD node placement to maximize security coverage while minimizing signal degradation. This is achieved through an intelligent placement algorithm that considers factors such as network topology, signal loss, and node redundancy to ensure secure and efficient quantum key distribution. Additionally, we introduce an adaptive micro-segmentation strategy that leverages real-time behavioral analytics to dynamically isolate data flows based on user activity and access patterns. This approach enhances network security by limiting the movement of threats and preventing lateral attacks.

 

To evaluate the effectiveness of our framework, we conducted extensive experimental simulations within enterprise environments. Our results demonstrate significant improvements in security, including enhanced resistance to eavesdropping attempts, faster threat detection, and superior confidentiality. By merging QKD's quantum-secure encryption principles with ZTA's dynamic verification capabilities, the proposed framework provides a scalable and robust solution for enterprises preparing for the post-quantum cybersecurity landscape.

 

KEYWORDS

Quantum Computing, Quantum Key Distribution, Zero-Trust Architecture, Post-Quantum Cryptography, Micro-Segmentation, Cybersecurity, Secure Key Exchange, Data Flow Control



Published On :
2025-03-18

Article Download :
Publish your academic thesis as a book with ISBN Contact – connectirj@gmail.com
Visiters Count :